• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 16
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 29
  • 14
  • 12
  • 9
  • 8
  • 8
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The Mr. Big Sting in Canada

2013 April 1900 (has links)
For approximately the last fifteen years, the Royal Canadian Mounted Police have been mounting highly sophisticated undercover sting operations in Canada known colloquially as Mr. Big stings. These undercover operations involve multiple officers posing as members of a ruthless, powerful and wealthy criminal organization in order to trick suspects into making confessions to serious crimes, nearly always homicides. The undercover officers essentially orchestrate a chance meeting with the suspect, known operationally as the “target”, and exert their considerable influence and resources to convince him that he is being inducted into a criminal gang. The target is typically a person suspected of having committed a murder in the past, but who has never been charged due to lack of evidence. Over a period of months or weeks the undercover officers attempt to build a relationship with the target based on fear, greed, companionship, or a combination of those or other emotions. The target is given tasks to perform which appear criminal in nature, but which are actually staged crimes in which every participant is an undercover officer. The target is eventually told he must meet with the boss of the gang, the “Mr. Big” after whom the sting is named, in order for a final decision to be made on whether or not the target can join the gang. The target is told that he must confess to the previous murder of which he is suspected in order to join the gang. Sometimes the target confesses readily, other times he protests his innocence, but Mr. Big will not accept exculpatory statements. Often further inducements are offered by Mr. Big, most notably a promise to derail the investigation by using his influence over corrupt justice system participants. If the suspect admits culpability he will be charged with the crime and nearly always convicted at trial. Canadian courts have exercised virtually no control over police tactics in these cases. Defence counsel have argued against the use of the evidence on the basis of a breach of the Charter of Rights and Freedoms with regard to the right to silence and also with regard to abuse of process. These arguments have been unsuccessful. Defence counsel have also argued unsuccessfully that the statements should be inadmissible under Canadian hearsay law. It has also been argued, equally unsuccessfully, that the undercover operators should be treated as persons-in-authority, and hence that the statements elicited from the targets should have to be proven voluntary beyond a reasonable doubt. Canadian judges have also been unwilling to allow the defence to lead expert evidence in these cases to tell the trier of fact about the possibility of false confessions. The ultimate result is that there is no control over police tactics in these stings. There has been one proven wrongful conviction as a result of these stings, that of Kyle Wayne Unger. Other wrongful convictions may come to light. Short of its outright abolition, probably the best way to control the sting and prevent wrongful convictions is to subject the statements to a formal voluntariness inquiry.
2

Snagging The Online Sexual Predator: Descriptions Of Who And How

Tetzlaff, Melissa 01 January 2010 (has links)
This study examines law enforcement personnel who work undercover chatting investigations in order to catch online sexual predators. This topic is quite timely, and law enforcement efforts in this area are new. As such, there is a dearth of research concerning the use of the internet as a location for law enforcement investigations, particularly as a setting for undercover work. This research addresses such questions as who are these law enforcement personnel who try to snag online sexual predators, how do they feel about working in the virtual world, what do they think about doing this type of work, how did they get selected for this particular position, how their jobs affect their personal lives outside of work, and what specifically their jobs entail. Twenty law enforcement personnel were interviewed from different parts of the United States. The interview schedule covered six areas: respondents' careers, their home lives, any training they have received that is relevant for their current positions, details about their jobs, the undercover aspects of their jobs, and their demographics. Findings are discussed. This study is important because it offers a closer look at the individuals who put their time and efforts into neutralizing online sexual predators before they can harm additional children. This knowledge will add to the current literature in this area as well as aid policy developers on issues concerning law enforcement organization and personnel.
3

Undercover Marketing : The method which lies beneath

Stenberg, Karolina, Pracic, Sabina January 2005 (has links)
<p>Background: A coming of age of a generation named Generation Y, which holds negative views on commercial messages, has resulted in the need of special marketing methods which are known to be more alternative. Guerrilla Marketing, being such a method holds beneath it Undercover Marketing which is another method and has the potential of reaching this generation.</p><p>Purpose: Our purpose is firstly to define a theoretical placement of Undercover Marketing, secondly to define the theoretical views on ethics regarding the mentioned term and thirdly to see if there is a future, a will, and knowledge for its usage within the Swedish community of marketing practitioners.</p><p>Method: The research for this thesis is done in a qualitative method through a series of interviews with four advertising firms and one freelance artdirector. The interviews were compared to each other and to the frame of reference during the analysis in order to create a more complete picture.</p><p>Results: In this thesis we have seen that there is a future in the use of Undercover Marketing as it can prove to be the only method able to reach Gen Y. However it must follow certain rules to succeed and companies must take certain factors into consideration prior to attempting a marketing campaign including this particular method.</p>
4

EFFECTIVENESS OF ANTI-BULLYING TEAMS FROM PRACTITIONERS' PERSPECTIVES

Lillard, Dorry 01 June 2015 (has links)
School bullying is a worldwide problem and has been called a “social phenomenon” that is negatively impacting the lives of children, including the bullies, the victims and the bystanders. This project used qualitative methods to investigate the implementation process and effectiveness of a bullying intervention called Undercover Anti-Bullying Teams. The “no blame” approach idea to healing bullying relationships originated by Bill Hubbard was later modified with narrative perspectives by Michael Williams, a counselor at a high school in Auckland, New Zealand. The purpose of this project was to gain qualitative insight from two practitioners in New Zealand, and two practitioners in California, about their personal experiences with the implementation of this approach. The data collected from the practitioners included implementation procedures of the undercover teams program, their personal success stories, team members’ responses, and the positive impact that the experiences have had for their lives. The study found that Undercover Anti-Bullying Teams have the potential to help students create positive change personally and in the classroom and school environment. The study also found that undercover teams have the potential to foster a safer environment for students to learn. Bullying is a serious problem in schools and has severe negative consequences for everyone involved. Effective bullying interventions and preventative measures can help create awareness that can minimize the prevalence of this growing epidemic.
5

Undercover Marketing : The method which lies beneath

Stenberg, Karolina, Pracic, Sabina January 2005 (has links)
Background: A coming of age of a generation named Generation Y, which holds negative views on commercial messages, has resulted in the need of special marketing methods which are known to be more alternative. Guerrilla Marketing, being such a method holds beneath it Undercover Marketing which is another method and has the potential of reaching this generation. Purpose: Our purpose is firstly to define a theoretical placement of Undercover Marketing, secondly to define the theoretical views on ethics regarding the mentioned term and thirdly to see if there is a future, a will, and knowledge for its usage within the Swedish community of marketing practitioners. Method: The research for this thesis is done in a qualitative method through a series of interviews with four advertising firms and one freelance artdirector. The interviews were compared to each other and to the frame of reference during the analysis in order to create a more complete picture. Results: In this thesis we have seen that there is a future in the use of Undercover Marketing as it can prove to be the only method able to reach Gen Y. However it must follow certain rules to succeed and companies must take certain factors into consideration prior to attempting a marketing campaign including this particular method.
6

Covert action as an option in National Security Policy : a comparison between the United States of America and South Africa (1961-2003)

Jansen van Rensburg, Petrus Frederik Barend January 2005 (has links)
Thesis (M.(Security Studies))-University of Pretoria, 2005. / Includes bibliographical references. Available on the Internet via the World Wide Web.
7

Guerrilla marketing / Guerrilla marketing

Ptáček, Petr January 2007 (has links)
Práce popisuje hlavní principy a myšlenky guerrilla marketingu, jeho různé styly a odnože a rozdíly oproti marketingu tradičnímu. Důraz je kladen na rozdílnost přístupu a stylu myšlení. Součástí jsou i aplikace jednotlivých myšlenek nebo nástrojů guerrilla marketingu na reálné nebo hypotetické situace, doplněné rozborem případových studií.
8

Makeshift Information Constructions: Information Flow and Undercover Police

Aksakal, Baris 08 1900 (has links)
This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
9

Privaatheidsaspekte van strafprosessuele beskerming teen onreëlmatige voorverhoor-owerheidsoptrede

Steyn, Anna Sophia 30 November 2004 (has links)
Text in Afrikaans / Infringement, by the executive, of the right to privacy of the individual is an everyday occurrence. Section 14 of the Constitution, Act 108 of 1996 protects the right to privacy. The Criminal Procedure Act, Act 51 of 1977 authorises the police service, to search for and seize articles, to enter premises, ascertain bodily features of accused and to employ traps and undercover operations. On the one hand the Criminal Procedure Act authorises the police to infringe the privacy of the individual but on the other hand it guarantees the privacy of the individual. The provisions of the Criminal Procedure Act are qualified by the Constitution, specifically by section 36 and 35(5). The authorisation of a police officer should be obtained before a person could be arrested without a warrant, which should, in any event, be the last resort. The written permission of an officer must be obtained prior to the making of an application for a warrant to a magistrate. A police officer should be prohibited from issuing a search warrant, as the general perception of the public is that members of the police may not be sufficiently independent. The exercising of magistrates' discretion regarding the decision as to whether a search warrant should be issued or not should be extended. A search warrant should comply with strict requirements as to who may execute the warrant, when, how and when the warrant will become invalid. Search and seizure without a warrant should not be allowed at all, except in circumstances where there is an immediate threat or danger to a person, property or the public safety. In cases of urgency, it should be made possible to obtain the telephonic permission from a magistrate to search property. Where necessary to ascertain the bodily features of an accused through surgery, a compulsory application in terms of section 37(3) should be made to the court for authorisation, irrespective of whether the accused consents to the surgery or not. More importance should be attached to the rights of the individual and the powers of the executive should be limited. / Jurisprudence / LL.D
10

[en] RECOMMENDATION OR ADVERTISING?: A STUDY ON FASHION BLOGS CREDIBILITY / [pt] RECOMENDAÇÃO OU PROPAGANDA?: ESTUDO SOBRE A CREDIBILIDADE DE BLOGS DE MODA

BEATRIZ D AVILA RENAULT DE OLIVEIRA 06 May 2015 (has links)
[pt] Os blogs de moda atraem uma grande audiência de mulheres em busca de inspirações sobre como se vestir. As leitoras procuram seguir as sugestões de autoras de bom gosto, com características demográficas similares às suas, e em que possam confiar. Este é o principal benefício oferecido pelo blog quando comparado às mídias tradicionais: ao blog é atribuído maior confiança, visto que as autoras estariam livres de vieses e representariam a consumidora comum. No entanto, sabe-se que um número considerável de autoras de blogs recebem presentes e recompensas financeiras para recomendar um produto em seu canal. Este fenômeno ocorre de duas maneiras diferentes: ou a autora admite a existência de uma parceria entre ela e a marca que recomenda, ou oculta esta parceria – fato este que tem levantado importantes questões éticas. Este estudo buscou identificar se a credibilidade do blog é afetada quando há indícios de que a autora omite seu vínculo com a marca que recomenda. Através de um experimento conduzido online com amostragem por conveniência, 350 questionários foram respondidos, sendo 157 válidos. Foi criado um endereço eletrônico que, de acordo com a determinação de algoritmos, apresentava ora blog e biografia de uma autora favorável à prática de identificar publicações patrocinadas, ora de uma autora que busca omitir seu vínculo com o produto que recomenda. O experimento comparou as médias para os construtos Confiança, Atitude e Intenção de Seguir Recomendação, onde apenas este último apresentou diferenças significativas entre as médias. O construto Credibilidade da Fonte também foi medido, indicando que os respondentes não são favoráveis à presença de propaganda nos blogs. / [en] Fashion blogs attract the interest of a large audience of women in search for dressing inspiration. The readers look for suggestions from neatness bloggers with demographic characteristics similar to their own, and who they can trust. The main benefit offered by blogs when compared to the traditional media is the reliability conferred to the blog, since the authors would be free of biases, representing the common consumer. Nevertheless, it is known that a considerable number of bloggers receive gifts and financial income to recommend products in their websites. This phenomenon occurs in two different ways: either the author recognizes the existence of a partnership with the recommended fashion brand, or conceals this partnership. This occurrence has provoked important ethical questions. This study focused on identify if the blog s credibility can be affected when there is evidence that the authors are hiding their connection with the recommended fashion brand. To answer this question, an online experiment with convenience samples resulted in 350 answered questionnaires, from which 157 were valid. It was created a website that, in accord with determination of algorithms, presented two types of blogs: one where the author is favorable to the practice of identifying sponsored posts, and another where the author seeks to hide a link with the brand that is recommended. The experiment compared the average for the theoretical constructs Reliability; Attitude and Intention to Follow Recommendation, which was the only one that presented substantial differences between the averages. The theoretical construct Source Reliability was also measured, indicating that the respondents are not favorable to the presence of propaganda in fashion blogs.

Page generated in 0.2482 seconds